1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
2 years ago
14

What is a man-in-the-middle attack​

Computers and Technology
2 answers:
VMariaS [17]2 years ago
4 0

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

Klio2033 [76]2 years ago
3 0

Answer:

a  warrior

Explanation:

You might be interested in
Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB
ahrayia [7]

<u>The total size of backups:</u>

The source data is 50 GB. When its full backup is created, it takes 50 GB of space. Now, next week when 10 more GB of data has been added, the total source data are 60 GB. On creating another full backup, the size comes  out to be 60 GB as well and cumulative backup is 50 GB + 60 GB which equates to 110 GB.

In the second week, another 30 GB has been added to the source data, and on full backup creation, the size will be 60 GB + 30 GB which equates to 90 GB. So, the total size of backups saved till date will be 110 GB + 90 GB which equates to 200 GB.

7 0
3 years ago
What is a computer network?
Fiesta28 [93]

Answer:

A computer network is a set of computers connected together for the purpose of sharing resources. The most common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server.

3 0
3 years ago
How are the internet and the World Wide Web different from each other
jeka94

The terms Internet and World Wide Web are often used interchangeably in everyday speech; it is common to speak it as " going on the Internet " when using a web browser to view web pages. However, the World Wide Web is only one of a large number of Internet services.

4 0
3 years ago
The _____ feature enables you to represent text as colorful visuals.
Radda [10]

Answer:

complex formatting feature enables you to represent text as colorful

visuals.

mark as brainliest

4 0
2 years ago
Your friend Cameron’s little sister is visually impaired. Cameron is worried that his sister will not be able to use technology
IceJOKER [234]
All modern technology has things to help disabled people
5 0
2 years ago
Other questions:
  • Write a static method, getBigWords, that gets a single String parameter and returns an array whose elements are the words in the
    15·1 answer
  • WHOEVER HELPS ASAP GETS BRAINLiEST!!!!!!!!! :)
    15·2 answers
  • Create a function average_temp(s) that accepts a file name s that contains temperature readings. Each line in the file contains
    15·1 answer
  • The first step in the five-step process for problem solving is to ____. evaluate take action understand the task or need complet
    10·2 answers
  • A network that typically reaches a few meters, such as up to 10 meters (33 feet), and consists of personal devices such as mobil
    14·1 answer
  • Dang was accepted to a biology program with a rigorous schedule and a high tuition, but good professors. What would be a benefit
    10·2 answers
  • What will the declaration below do to its target?
    9·1 answer
  • Davingould1115...................answer 3​
    11·1 answer
  • What is wrong with the following code? publicstatic char grade(int score) { if (score &gt;= 9) { return 'A'; } else if (score &g
    6·1 answer
  • What is computer specification
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!